Analysis
-
max time kernel
171s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 03:07
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
205KB
-
MD5
1541ba7e50e778f758fb3d704c8756b7
-
SHA1
95811e024e11472481f1658e72d580ff57c2fc65
-
SHA256
6a8ff340b0778558c143418ebd0cda9ec2a3454142ce3e5dec6e4b5d47609f45
-
SHA512
29c6ef2bd98ed6485180ad9453a099424dab08d048053a5cf10c77d81e3f4819c32f85cf65a5f98bd22a41c70c7fbbd42455d0366e81f9c987182131f0f9a15b
-
SSDEEP
3072:PQkW/BsH4kSe65KU5smmJOLnF693YLAiw3kzI8zsk43Ni46Zm3k0ShBe:PQG4kNU5mZ3jfkz8kaiDZKk0Shc
Malware Config
Extracted
amadey
3.50
31.41.244.17/hfk3vK9/index.php
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
gntuud.exegntuud.exegntuud.exegntuud.exepid process 628 gntuud.exe 2804 gntuud.exe 5112 gntuud.exe 1752 gntuud.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
file.exegntuud.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation gntuud.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2100 1252 WerFault.exe file.exe 3824 2804 WerFault.exe gntuud.exe 1852 5112 WerFault.exe gntuud.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
file.exegntuud.exedescription pid process target process PID 1252 wrote to memory of 628 1252 file.exe gntuud.exe PID 1252 wrote to memory of 628 1252 file.exe gntuud.exe PID 1252 wrote to memory of 628 1252 file.exe gntuud.exe PID 628 wrote to memory of 2844 628 gntuud.exe schtasks.exe PID 628 wrote to memory of 2844 628 gntuud.exe schtasks.exe PID 628 wrote to memory of 2844 628 gntuud.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN gntuud.exe /TR "C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe" /F3⤵
- Creates scheduled task(s)
PID:2844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 8962⤵
- Program crash
PID:2100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1252 -ip 12521⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe1⤵
- Executes dropped EXE
PID:2804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 4162⤵
- Program crash
PID:3824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2804 -ip 28041⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe1⤵
- Executes dropped EXE
PID:5112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 4162⤵
- Program crash
PID:1852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 5112 -ip 51121⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exeC:\Users\Admin\AppData\Local\Temp\3f904562a0\gntuud.exe1⤵
- Executes dropped EXE
PID:1752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1752 -ip 17521⤵PID:1956
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD51541ba7e50e778f758fb3d704c8756b7
SHA195811e024e11472481f1658e72d580ff57c2fc65
SHA2566a8ff340b0778558c143418ebd0cda9ec2a3454142ce3e5dec6e4b5d47609f45
SHA51229c6ef2bd98ed6485180ad9453a099424dab08d048053a5cf10c77d81e3f4819c32f85cf65a5f98bd22a41c70c7fbbd42455d0366e81f9c987182131f0f9a15b
-
Filesize
205KB
MD51541ba7e50e778f758fb3d704c8756b7
SHA195811e024e11472481f1658e72d580ff57c2fc65
SHA2566a8ff340b0778558c143418ebd0cda9ec2a3454142ce3e5dec6e4b5d47609f45
SHA51229c6ef2bd98ed6485180ad9453a099424dab08d048053a5cf10c77d81e3f4819c32f85cf65a5f98bd22a41c70c7fbbd42455d0366e81f9c987182131f0f9a15b
-
Filesize
205KB
MD51541ba7e50e778f758fb3d704c8756b7
SHA195811e024e11472481f1658e72d580ff57c2fc65
SHA2566a8ff340b0778558c143418ebd0cda9ec2a3454142ce3e5dec6e4b5d47609f45
SHA51229c6ef2bd98ed6485180ad9453a099424dab08d048053a5cf10c77d81e3f4819c32f85cf65a5f98bd22a41c70c7fbbd42455d0366e81f9c987182131f0f9a15b
-
Filesize
205KB
MD51541ba7e50e778f758fb3d704c8756b7
SHA195811e024e11472481f1658e72d580ff57c2fc65
SHA2566a8ff340b0778558c143418ebd0cda9ec2a3454142ce3e5dec6e4b5d47609f45
SHA51229c6ef2bd98ed6485180ad9453a099424dab08d048053a5cf10c77d81e3f4819c32f85cf65a5f98bd22a41c70c7fbbd42455d0366e81f9c987182131f0f9a15b
-
Filesize
205KB
MD51541ba7e50e778f758fb3d704c8756b7
SHA195811e024e11472481f1658e72d580ff57c2fc65
SHA2566a8ff340b0778558c143418ebd0cda9ec2a3454142ce3e5dec6e4b5d47609f45
SHA51229c6ef2bd98ed6485180ad9453a099424dab08d048053a5cf10c77d81e3f4819c32f85cf65a5f98bd22a41c70c7fbbd42455d0366e81f9c987182131f0f9a15b